{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,14]],"date-time":"2026-01-14T17:09:09Z","timestamp":1768410549496,"version":"3.49.0"},"reference-count":26,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,10]]},"DOI":"10.1109\/malware.2014.6999410","type":"proceedings-article","created":{"date-parts":[[2015,1,19]],"date-time":"2015-01-19T21:44:39Z","timestamp":1421703879000},"page":"8-17","source":"Crossref","is-referenced-by-count":13,"title":["Host-based code injection attacks: A popular technique used by malware"],"prefix":"10.1109","author":[{"given":"Thomas","family":"Barabosch","sequence":"first","affiliation":[{"name":"Fraunhofer FKIE, Friedrich-Ebert-Allee 144, 53113 Bonn, Germany"}]},{"given":"Elmar","family":"Gerhards-Padilla","sequence":"additional","affiliation":[{"name":"Fraunhofer FKIE, Friedrich-Ebert-Allee 144, 53113 Bonn, Germany"}]}],"member":"263","reference":[{"key":"19","author":"portnoy","year":"2011","journal-title":"MindshaRE Debug-ging Via Code Injection with Python"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516670"},{"key":"18","doi-asserted-by":"crossref","first-page":"54","DOI":"10.1007\/11790754_4","article-title":"Network-Level polymorphic shellcode detection using emulation","author":"polychronakis","year":"2006","journal-title":"Detection of Intrusions and Malware & Vulnerability Assessment"},{"key":"15","author":"matrosov","year":"2010","journal-title":"Stuxnet Under the Microscope"},{"key":"16","author":"lveill","year":"2012","journal-title":"OSX\/Flashback-The First Malware to Infect Hundreds of Thousands of Apple Mac"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948146"},{"key":"14","author":"kessem","year":"2013","journal-title":"Thieves Reaching for Linux Hand of Thief Trojan Targets Linux"},{"key":"11","author":"grunzweig","year":"2012","journal-title":"The Dexter Malware Getting Your Hands Dirty"},{"key":"12","author":"guilfanov","year":"2005","journal-title":"Windows WMF Metafile Vulnerability HotFix"},{"key":"21","author":"schwarz","year":"2013","journal-title":"Citadel's Man-In-The-Firefox An Implementation Walk-Through"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1145\/2133375.2133377"},{"key":"22","author":"seitz","year":"2009","journal-title":"Gray Hat Python Python Programming for Hackers and Reverse Engineers"},{"key":"23","volume":"18","year":"2013","journal-title":"2013 Internet Security Threat Report"},{"key":"24","year":"0","journal-title":"Zeus Source Code"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1145\/1367497.1367695"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2013.06.007"},{"key":"3","article-title":"Efficient Detection of Split Personalities in Malware","author":"balzarotti","year":"2010","journal-title":"NDSS"},{"key":"2","year":"2012","journal-title":"More Human Than Human-Flames Code Injection Techniques"},{"key":"10","author":"giuliani","year":"2011","journal-title":"ZeroAccess An Advanced Kernel Mode Rootkit"},{"key":"1","year":"0"},{"key":"7","author":"dong","year":"2014","journal-title":"Oldboot B The Hiding Tricks Used by Bootkit on Android"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-23644-0_14"},{"key":"5","author":"barabosch","year":"0","journal-title":"List of Malicious Samples Used in Host-Based Code Injection Attacks A Popular Technique Used by Malware"},{"key":"4","article-title":"Bee Master: Detecting Host-Based Code Injection Attacks","author":"barabosch","year":"2014","journal-title":"Detection of Intrusions and Malware and Vulnerability Assessment 11th International Conference DIMVA 2014 Egham"},{"key":"9","author":"ghizzoni","year":"2004","journal-title":"Method for Injecting Code into Another Process"},{"key":"8","first-page":"326","volume":"1989","author":"eichin","year":"1988","journal-title":"With Microscope and Tweezers An Analysis of the Internet Virus of November"}],"event":{"name":"2014 9th International Conference on Malicious and Unwanted Software: \"The Americas\" (MALWARE)","location":"Fajardo, PR, USA","start":{"date-parts":[[2014,10,28]]},"end":{"date-parts":[[2014,10,30]]}},"container-title":["2014 9th International Conference on Malicious and Unwanted Software: The Americas (MALWARE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6987537\/6999400\/06999410.pdf?arnumber=6999410","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,6,8]],"date-time":"2021-06-08T03:04:29Z","timestamp":1623121469000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/6999410\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,10]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/malware.2014.6999410","relation":{},"subject":[],"published":{"date-parts":[[2014,10]]}}}